(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Publishing Venue

Related People

Abstract

In conventional pagers, a "hard" reset will take place due to a number of factors such as removal of a primary cell for too long a time, insufficient power in a backup cell in the absence of the primary cell or corruption of information stored in the RAM. When a pager resets, unprotected data such settings or unlocked messages are usually lost.

Copyright

Motorola Inc. September 1998

Country

United States

Language

English (United States)

This text was extracted from a PDF file.

At least one non-text object (such as an image or picture) has been suppressed.

This is the abbreviated version, containing approximately
70% of the total text.

Page 1 of 1

0 M

MOTOROLA Technical Developents

EMERGENCY PAGER RECOVERY PROTOCOL

by Pang Kang Ming, Chan Yi Huei, Kwok Lih and Tan Sew Liang

In conventional pagers, a "hard" reset will take place due to a number of factors such as removal of a primary cell for too long a time, insufficient power in a backup cell in the absence of the primary cell or corruption of information stored in the RAM. When a pager resets, unprotected data such settings or unlocked messages are usually lost.

This article describes an emergency pager recov- ery protocol for improving robustness of a pager. The protocol dictates that the pager will periodically log up all vital information for storage in a safe memory location. Logged-up data can therefore be retrieved instead of being discarded.

Figure I is a flow diagram of operating steps for the protocol in which information and settings are periodically logged for storage. Frequency of data logging as such is pre-determined in the protocol. However, data logging should not be performed too frequently as power may be unnecessarily con- sumed. As "hard" resets do not happen very often, data logging can be done, for example, every fifteen minutes or so.

Data logging and data retrieving upon a "hard" reset of the pager are easily applied using software. Following a "hard" reset, a user can easily retrieve data stored earlier. In most situations, data stored with this protocol is sufficient for users of pagers as it is unlikely that any typical user ex...